SECRET SOCIETY AND ORGANIZED CRIME TECHNOLOGIES::

SECRET SOCIETY AND ORGANIZED CRIME TECHNOLOGIES
RAILROAD CROSSING "Sed quis custodiet ipsos custodes?" ("But who will watch the watchers?")
Juvenal

A lot of information has been gathered on these technologies. Unfortunately no systematic work of Modus Operandi research has been produced to identify all the technologies, analyzed their operations, identified and developed countermeasures, performed systematic prosecutions.

The technologies are: Recognition; Transportation; Communication; Brainwashing; and Hypnopaedia. Information about each may be accessed via the Links at the bottom of this Web Page.

How these are utilized is disclosed in: Control Methods; Operations; and Your Own House. Information about each may be accessed via the Links at the bottom of this Web Page.

These technologies, like almost all techniques, can be either a benefit or a detriment depending on the purpose to which they are applied. These techniques can be used for public safety such as patrols and standing watch. Or the same techniques can be used for drug smuggling. Your choices. Your consequences.

Don't get hustled. Some folks using this stuff are cons looking to make money, own you, take your stuff and take your life if you let them. Just say no! And when they say no one will believe you, don't believe them. This stuff has been used for centuries and is not secret. Similar technologies have been used as evidence in numerous successful prosecutions of Organized Crime. Conspiracy theories? As Foreman of a Federal Grand Jury, I helped indict several people for 'Criminal Conspiracy' and so have Grand Juries across the United States; these indictments were followed by convictions by Trial Juries.

ORGANIZED CRIME A library of books and films about the Sicilian Mafia and Italian Camarra has been produced. The interested Web Surfer can find a lot about them on the 'Net. The Mafia initiation ritual was printed in the 'Boston Globe' about 1988. Other criminal organizations have recently been exposed, prosecuted, convicted, then documented by reliable authors:

"The Dragon Syndicates: The Global Phenomenon of the Triads" by Martin Booth, 1999, about the Chinese and Asian Triads

"Red Mafiya", Robert I. Friedman, 2000 about the Russian and East European Mafia.

SOME OTHER ORGANIZED CRIME GROUPS: French Corsican Brotherhood; Jamaican Posses; Columbian Drug Cartels; Mexican Mafias North & South; Italian Camorras; Nigerian; African-American; Outlaw Motorcycle Gangs; Albanian; Aboriginal; Japanese Yakuza; Irish.

Surfing the 'Net provides some identification and prosecution information. In the sections below, Forensic information is referenced as available and appropriate.

The best all around studies are of Street Gangs. Organized Crime recruits from the Street Gangs and Street Gangs uses the same technologies in simplified form. The best place to find examples of Gang Clothes, Tattoos, Finger and Hand Gestures, Hair Styles and Beard Styles plus other technologies is at the NATIONAL ALLIANCE OF GANG INVESTIGATORS ASSOCIATIONS (NAGIA):

NATIONAL ALLIANCE OF GANG INVESTIGATORS ASSOCIATIONS

SPIES AND MILITARY Less laudable were the WWII codes of a Japanese Spy known as the "Doll Woman," Velvalee Dickinson, who used toy dolls and letters about them as an analogy code. "The doll hospital is working around the clock on the doll in a hula skirt" meant the USS Honolulu was in for repairs at Seattle shipyard. The Japanese also used a marine biology expedition to Buenos Aires as a cover story and used fish species and their dimensions as analogies to identify and describe US Warships.

Check also the military's Psychological Warfare and Nonlethality Doctrine techniques to supplement your knowledge.

VIGILANTES, TERRORISTS, HATE GROUPS, RELIGIOUS FANATICS The "Old Man of the Mountain" cult in the Middle Ages in what is now Lebanon also called the Assassins used hashish and a garden of delights to initiate recruits. Recruits were drugged and placed in an artifical paradise of drugs, sex and delights. This experience made the initiates fanatical devotees because they were also told they'd receive such a paradise for eternity if they died in service to the "Old Man." The devotees became Assassins and the cult was feared throughout the Middle East for centuries.

Other Secret Society groups such as the 'Know Nothings', 'Molly Maquires', 'Wobblies', 'Whiteboys', 'Ribbonmen', and several 'Ku Klux Klans' decorate United States history.

FRATERNAL, RELIGIOUS AND CIVIC Historic examples abound. The Abolitionists are an important positive example in the United States. Their "Underground Railroad" helping slaves escape to freedom. Included technologies were songs with concealed navigation codes, quilts, lights and key-word analogy code from railroad terminology. Another positive was the "Wat Tyler Rebellion" in 14th Century England where Lincoln Green Hoods and Capes wereused as recognition clothing. Early Mystery Cults in Ancient Greece, such as the Pythagoreans and Eleusinians, had initiations and signals still known.

Examples from the sixth century B.C.E. Pythagoreans will be included here. The number codes, recognition coin, anagrams for the six directions from the center of a cube for instance. These all are almost indentical to some of today's codes. The reason is simple, the are the same. The NeoPlatonists, descended from Plato's Academy, absorbed most or all of the Pythagorean School system. The NeoPlatonists were reintroduced into Europe in the ninth century and propagated as the 'Realists' school of the Scholastics.

The simplest and most common dirty tricks are the hazing of new employees and pledges in Fraternities and Sororities. Good references works are:

"Fitting In: How to Get a Good Start in Your New Job" by Natasha Josefowitz and Herman Gadon, 1988, Chapters 1, 2 and 3.

"Big Secrets" by William Poundstone, 1983, Chapter 18: 'Crashing the Freemasons' includes hazing stunts.

College Frat hazing incidents resulting in death have been infrequently reported in the press.

PUBLIC SAFETY The 'good guys' aren't always good. And sometimes they get manipulated. Security people use these techniques. Abuse and deception are usually part of the result. Employees soon learn to send fake codes and shakedown honest employees under the threat of faking such codes against them.

Confidential Informant disclosures have been in the press for 25 years. They use the same techniques. An FBI Informant who committed gangland murder while protected by the FBI has resulted in the prosecution and conviction of that Special Agent. Informant hustles are a part of the wrongful convictions of a dozen people on death row in Illinois who recently determined innocent by DNA evidence.

Neighborhood Watch and Community Watch use these techniques to some extent and abuse the priviledge. Besides abuse by some members, codes are faked to extort or to incriminate others for crimes committed by the gang faking the signals.

COMMENTARY With these techniques in mind, I was taught them. Anybody can be taught them. Not all at once. But over time. You need to know these techniques for self-defense. And with documentation you can prosecute: Harrassment; Vandalism; Defamation; Stalking; Solicitation for immoral purposes; Theft by Deception; Assault; Murder; Criminal Conspiracy; Racketeering.

Or you can join opposition groups. Learn the 'Walk and Talk' to beat the ***** at their own games. A lot of work! And conditioning requires exaggerating your sensory level at the expense of your thought processes. In short, you become highly sensitive to sight and sound but your thinking stops, you react and don't think, just perform. Not so good.

You can build your own system. Remember when these idiots say they are knowledgeable, they only mean their own 'made up' system of techniques. Most don't even know there is a set of standards to decide when a member does something whether or not the act fits the standard. For a standard use something nonobvious such as semi-conductor manufacturing and physics. Then build your set of analogies. Remember the more complex the system, although the codes are more secure, the more errors there will be and there will be more breakdowns as a result.

The stuff is taught nonverbally via repetition, just like when you were a child and couldn't speak nor understand any language. You must learn to crawl, then walk, then talk. Next is to go where you are told, next find your own way around, Finally, you must pick and be picked for a 'secret trade' skill, learn the job, then perform the job and finally teach the job to others. This is also a key element in preparation for brainwashing. Once you are conditioned to obey, each act of obedience becomes easier.
Click On A Topic Below To Proceed To Another Section
RECOGNITION TRANSPORT WALK TRANSPORT DRIVE SECRET TALK
CONTROL METHODS BRAINWASHING OPERATIONS YOUR OWN HOUSE